Hi!

On Sun, Jul 14, 2013 at 5:01 AM, Ralph Holz <h...@net.in.tum.de> wrote:
> I don't see how "no need to make a decision" should be possible. If you
> don't know any contacts in the network, how are you supposed to trust them?

Ideally, you shouldn't have to trust anybody. :-)

You should be able to turn on your overlay network node, it should
connect to the network, and you should be able to communicate with
anybody, despite somebody trying to censor you.

Sadly, it seems we are not yet there. Or maybe we will never be.

> First of all, they use recursive routing instead of iterative lookups
> (that's important to deal with the attacker on the IP level). Then they
> use a random walk to get around a tactically acting attacker trying to
> occupy important spots in the network, before they switch to the normal
> routing.

It seems CJDNS is using the recursive routing approach? But isn't so
that it is enough that in the whole routing path you get only one
adversary node and this node can black hole your packets?


Mitar

-- 
http://mitar.tnode.com/
https://twitter.com/mitar_m
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to